期刊文献+

一种改进的云存储数据完整性验证方案

An Improved Method of Data Integrity Auditing for Cloud Storage
在线阅读 下载PDF
导出
摘要 云存储为用户提供了便利的存储服务,但使用户失去了对其数据的直接控制,难以保证数据的完整性和可用性。本文在分析现有完整性验证方案的基础上,提出一种基于RSA签名体制的改进验证方案,该方案能有效检验服务器是否完整存储用户数据,支持公开审计,保护用户私密信息,并能准确定位发生错误的数据块。通过安全分析和性能分析表明,本方案是一个高效可行的数据完整性验证方案。 Cloud storage service provides cloud users with significant convenience. However, losing the physical possession makes users can not ensure the integrity of the outsourced data. After analyzing the current auditing scheme, the paper proposes a RSA Signature-based data integrity verification scheme, which is privacy-preserving, also supports public auditing and locating the error data. The detail security analysis and performance analysis show that the proposed scheme is secure and efficient.
出处 《计算机与现代化》 2016年第10期92-95,共4页 Computer and Modernization
基金 广东省大学生创新创业训练项目(1055915063)
关键词 云存储 数据完整性 隐私保护 错误定位 cloud storage data integrity privacy-preserving locating error data
作者简介 戴颖玲(1993-),女,广东茂名人,暨南大学计算机科学系本科生,研究方向:计算机科学与技术; 陈俊杰(1994-),男,广东罗定人,本科生,研究方向:计算机科学与技术;周德华,男,副教授; 陈杰朗(1993-),男,本科生,研究方向:计算机科学与技术。
  • 相关文献

参考文献7

二级参考文献107

  • 1Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 2Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 3Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 4Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 5Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 6Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 7Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 8Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.
  • 9Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS'07). New York:ACM, 2007:598-609.
  • 10Filho D, Baretto P. Demonstrating data possession and uneheatable data transfer [EB/OL]. [2008-02-10]. http:// eprint. iacr. org/2006/150. pdf.

共引文献243

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部